GLSA-201311-20 : Okular: Arbitrary code execution
Medium Nessus Plugin ID 71122
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-201311-20 (Okular: Arbitrary code execution)
Okular contains a heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp.
A remote attacker could entice a user to open a specially crafted PBD file using Okular, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.
There is no known workaround at this time.
SolutionAll Okular users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=kde-base/okular-4.4.5-r2'